Private link egress is in the beta phase of development and may not be available on your enrollment. Functionality may change during active development.
Private links, also called VPC connectivity, are cloud provider services that allow direct, secure connectivity between the Palantir platform and another system hosted on the same cloud provider as the Palantir platform. Learn more about private links.
Private link egress refers to traffic from the Palantir platform to your cloud VPC, and is currently configurable by users only for AWS-hosted Palantir platforms connecting to customer services hosted in the same AWS region, powered by AWS PrivateLink ↗. If your target resource is in a different region, configure VPC peering ↗ to the Palantir platform’s region, then create a private link.
This page outlines how private link egress is configured and managed in Control Panel, and how these created connections are used in the Palantir platform. Private link egress supports private egress to AWS services, user-owned resources deployed on AWS, or third-party APIs deployed on AWS.
If you want to configure a private link for ingress to Foundry (that is, making requests from your network to Foundry), consult the private link documentation.
To increase these limits contact your Palantir administrator.
Navigate to the Private links tab in the Network egress page in Control Panel to manage private links.

To successfully create a private link connection, do the following:
A list of private link compatible AWS services and their endpoint service names can be found in the AWS documentation ↗. Creation of an endpoint service is not required for AWS services, the endpoint service name provided by AWS can be used. An example of an AWS service that supports private links is Amazon Bedrock ↗.
Private links to AWS S3 are not supported. Use same region S3 bucket policies for private connectivity to S3.
For a user-owned resource deployed on AWS, create an endpoint service following the steps in the AWS documentation ↗. An example of a user owned resource is databases powered by AWS RDS ↗.
For user-owned third-party APIs deployed on AWS, create an endpoint service following the steps from the AWS documentation ↗. If owned by another party, request their VPC endpoint service name. For example, Snowflake’s VPC endpoint service name can be requested as shown in the Snowflake documentation ↗.
Additionally, request the private domains of third-party APIs if the service uses custom transport layer security (TLS) certificates that are not valid for the AWS-generated domain ↗ of the private link. For example, Snowflake’s private domains can be found following the Snowflake documentation ↗. Below is an example of a private third party domain:
abc.us-east-1.privatelink.snowflakecomputing.com
To access the target resource through a private link, allow the Palantir platform to access the resource. Add the Palantir platform’s AWS account in the allowed principal list of your endpoint service by following the AWS documentation ↗. The allowed principal should look like the following:
arn:aws:iam::<palantir_platform_aws_account_id>:root

Navigate to Control Panel > Network Egress > Private links and select New private link to create a private link.
Enter the following details for your target resource for the private link:

Advanced settings:
CNAME records for theses domains that map to the other end of the private link.
The private link may have the following states:
If the private link is in the Failed state, one of the following errors have occurred:
After successful creation of a private link, create private link egress policies to allow egress to the target resource.




Once the private link is in the Ready state and network egress policies are created, the private link can be used in the Palantir platform.
Possible actions on the private link are displayed under Actions in the private link details page, and in the private links page for each item.


A private link’s Private domains and TCP ports can be updated by selecting Actions > Update.

Private links can be deleted by selecting Actions > Delete.
Share the created network egress policies with users who intend to egress to the target resource through the private link. On the domain or IP that is to be shared, select Actions > View network egress policy and navigate to the network policy page. On the network policy page select Actions > Manage sharing and add the intended user or user group to share the network egress policy.

In Data Connection, configure a source using the default domain or the third-party API domain, and attach the created network egress policies. After configuring, test connectivity by previewing or exploring the source and verifying that the source’s data is accurate.
To create a Snowflake source connected through a private link, follow these steps:
For the Palantir platform to create a private link to Snowflake, the Palantir platform’s account needs to be allowlisted in your Snowflake account. To do this follow these steps:

SYSTEM$AUTHORIZE_PRIVATELINK cannot be used, since Palantir users do not have direct access to the underlying cloud provider infrastructure and are not provided with the required federated_token.Once Snowflake has allowlisted the Palantir platform’s cloud provider account, continue to the next step.
Before creating a private link between the Palantir platform and Snowflake, retrieve the private link configuration from Snowflake by running the command SYSTEM$GET_PRIVATELINK_CONFIG ↗. This command outputs the required information to create a private link in the Palantir platform.

privatelink-vpce-id from the output of SYSTEM$GET_PRIVATELINK_CONFIG.SYSTEM$GET_PRIVATELINK_CONFIG:
privatelink-account-urlprivatelink-connection-ocsp-urlsprivatelink-connection-urlsprivatelink-ocsp-urlregionless-privatelink-account-urlregionless-snowsight-privatelink-urlsnowsight-privatelink-url443 and 80 as mentioned in the Snowflake documentation ↗.Once configured, select Create to create the private link. When the private link is in the Ready state, continue to the next step.

Create network egress policies for all of the URLs output by the command SYSTEM$ALLOWLIST_PRIVATELINK ↗. Additionally, create an S3 bucket policy for the STAGE of the output as shown below:

For more information on Snowflake configuration refer to our Snowflake documentation.